no code implementations • 27 Mar 2024 • Krushi Patel, Fengjun Li, Guanghui Wang
Detecting and segmenting polyps is crucial for expediting the diagnosis of colon cancer.
no code implementations • 13 Mar 2024 • Jiajun Shen, Fengjun Li, Morteza Hashemi, Huazhen Fang
In the swift evolution of Cyber-Physical Systems (CPSs) within intelligent environments, especially in the industrial domain shaped by Industry 4. 0, the surge in development brings forth unprecedented security challenges.
2 code implementations • 7 Jun 2023 • Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo
In this paper, we aim to present a comprehensive study of the detectability of ChatGPT-generated content within the academic literature, particularly focusing on the abstracts of scientific papers, to offer holistic support for the future development of LLM applications and policies in academia.
no code implementations • 25 Jul 2022 • Fengjun Li, Xin Feng, Fanglin Chen, Guangming Lu, Wenjie Pei
The real-world degradations can be beyond the simulation scope by the handcrafted degradations, which are referred to as novel degradations.
no code implementations • 31 May 2022 • Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo
In this paper, we present the first large-scale study on the stealthiness of adversarial samples used in the attacks against deep learning.
1 code implementation • 30 Jan 2022 • Krushi Patel, Andres M. Bur, Fengjun Li, Guanghui Wang
Local Transformer-based classification models have recently achieved promising results with relatively low computational costs.
no code implementations • 1 Oct 2021 • Xin Feng, Wenjie Pei, Fengjun Li, Fanglin Chen, David Zhang, Guangming Lu
Most existing methods for image inpainting focus on learning the intra-image priors from the known regions of the current input image to infer the content of the corrupted regions in the same image.
1 code implementation • 25 Sep 2021 • Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, Bo Luo
To this end, Argos first amplifies the discrepancies between the visual content of an image and its misclassified label induced by the attack using a set of regeneration mechanisms and then identifies an image as adversarial if the reproduced views deviate to a preset degree.